单选题 Brian is a researcher at a major university. As part of his research, he logs into a computing cluster hosted at another institution using his own university’s credentials. Once logged in, he is able to access the cluster and use resources based on his role in a research project, as well as using resources and services in his home organization. What has Brian’s home university implemented to make this happen?
布赖恩是一所重点大学的研究员。作为研究的一部分,他使用自己大学的证书登录到另一个机构托管的计算集群。登录后,他就可以访问集群并根据他在研究项目中的角色使用资源,以及使用他所在组织中的资源和服务。布莱恩的家乡大学采取了什么措施来实现这一目标?

A、 Domain stacking 域堆叠
B、 Federated identity management 联合身份管理
C、 Domain nesting 域嵌套
D、 Hybrid login 混合登录
下载APP答题
由4l***ga提供 分享 举报 纠错

相关试题

单选题 Place the following steps in the order in which they occur during the Kerberos authentica- tion process. 按照在 Kerberos 身份验证过程中发生的顺序放置以下步骤。
1)Client/server ticket generated 生成的客户端/服务器票证
2)TGT generated 生成的 TGT
3)Client/TGS key generated 生成的客户端/TGS 密钥
4)User accesses service 用户访问服务
5)User provides authentication credentials 用户提供身份验证凭据

A、 5, 3, 2, 1, 4
B、 5, 4, 2, 1, 3
C、 3, 5, 2, 1, 4
D、 5, 3, 1, 2, 4

单选题 Which of the following is not a weakness in Kerberos?
以下哪一项不是 Kerberos 的弱点?

A、 The KDC is a single point of failure. KDC 是单点故障。
B、 Compromise of the KDC would allow attackers to impersonate any user. KDC 的妥协将允许攻击者冒充任何用户。
C、 Authentication information is not encrypted. 认证信息未加密。
D、 It is susceptible to password guessing. 它容易受到密码猜测的影响。

单选题 If Susan’s organization requires her to log in with her username, a PIN, a password, and a retina scan, how many distinct authentication factor types has she used?
如果 Susan 的组织要求她使用她的用户名、PIN、密码和视网膜扫描来登录,那么她使用了多少种不同的身份验证因素类型?

A、 One 一
B、 Two 二
C、 Three 三
D、 Four 四

单选题 Which of the following is best described as an access control model that focuses on subjects and identifies the objects that each subject can access?
以下哪一项最能描述为关注主体并标识每个主体可以访问的客体的访问控制模型?

A、 An access control list 访问控制列表
B、 An implicit denial list 隐式拒绝列表
C、 A capability table 能力表
D、 A rights management matrix 权限管理矩阵

单选题 What major issue often results from decentralized access control?
去中心化访问控制通常会导致什么主要问题?

A、 Access outages may occur. 可能会发生访问中断。
B、 Control is not consistent. 控制不一致。
C、 Control is too granular. 控制过于细化。
D、 Training costs are high. 培训成本高。

单选题 Voice pattern recognition is what type of authentication factor?
语音模式识别是什么类型的认证因素?

A、 Something you know 你知道的东西
B、 Something you have 你有的东西
C、 Something you are 你是什么东西
D、 Somewhere you are 你在哪里

单选题 Charles wants to deploy a credential management system (CMS). He wants to keep the keys as secure as possible. Which of the following is the best design option for his CMS implementation?
Charles 想要部署凭证管理系统 (CMS)。他希望尽可能保证密钥的安全。以下哪一项是其 CMS 实施的最佳设计选项?

A、 Use AES-256 instead of 3DES. 使用 AES-256 而不是 3DES。
B、 Use long keys. 使用长键。
C、 Use an HSM. 使用 HSM。
D、 Change passphrases regularly. 定期更改密码。

单选题 Jim’s organization-wide implementation of IDaaS offers broad support for cloud-based appli- cations. Jim’s company does not have internal identity management staff and does not use centralized identity services. Instead, they rely upon Active Directory for AAA services. Which of the following options should Jim recommend to best handle the company’s on-site iden- tity needs?
Jim 在组织范围内实施的 IDaaS 为基于云的应用程序提供了广泛的支持。Jim 的公司没有内部身份管理人员,也不使用集中式身份服务。相反,他们依赖 Active Directory 提供 AAA 服务。Jim 应该推荐以下哪个选项来最好地处理公司的现场身份需求?

A、 Integrate on-site systems using OAuth. 使用 OAuth 集成现场系统。
B、 Use an on-premises third-party identity service. 使用本地第三方身份服务。
C、 Integrate on-site systems using SAML. 使用 SAML 集成现场系统。
D、 Design an internal solution to handle the organization’s unique needs. 设计一个内部解决方案来处理组织的独特需求。